BC4003 Operating System Security Syllabus:
BC4003 Operating System Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To learn the basics of operating system concepts and its security mechanisms.
To understand the protection threats to an operating system and various protection mechanisms.
To understand the security goals and protect the operating system from threats and attacks.
To learn the security concepts for a server and analyze the various networking technologies for the Linux operating system.
UNIT I INTRODUCTION
Introduction, Computer system organization and architecture, Operating system structure and operations, Process Management, Memory Management, file systems management Protection and security, Scheduling Algorithms, Inter process Communication
UNIT II OPERATING SYSTEMS PROTECTION
Protection Goals, Protection Threats, Access Control Matrix, Access Control Lists(ACL‘s), Capability Lists(C-lists), Protection systems, Lampson‘s access matrix, mandatory protection systems, Reference monitor, Secure operating system definition
UNIT III OPERATING SYSTEM SECURITY
Security Goals, Security Threats, Security Attacks- Trojan Horses, Viruses and Worms, Buffer Overflow attacks and Techniques, Formal Aspects of Security, Encryption- Attacks on Cryptographic Systems, Encryption Techniques, Authentication and Password Security, Intrusion detection, malware defenses, UNIX and Windows Security
UNIT IV SYSTEM ADMINISTRATION
Security Basics, Securing the Server Itself, Maintenance and Recovery, Monitoring and Audit, Introduction to Linux Systems, Configuration Management, Log Auditing and Vulnerability Assessment.
UNIT V LINUX NETWORKING
Networking Technologies: DHCP, DNS, NFS/ISCSI, SMTP, SNMP, LAMP, Firewall/IDS/SSH, Securing Linux. Case Studies: Security and Protection- MULTICS, UNIX, LINUX and Windows, Windows and Linux Coexisting.
COURSE OUTCOMES:
CO1:Understand the operating system’s security concepts and its security control mechanisms.
CO2:Demonstrate the Access control matrix, access control list and Lampson‘s access matrix
CO3:Identify the Encryption Techniques, Authentication and Password Security issues
CO4:Understand the security threats and attacks on cryptographic systems
CO5: Apply the security and protection mechanisms for different operating systems
TOTAL: 45 PERIODS
REFERENCES
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, “Operating System Concepts”, 10th Edition, Wiley Publication, 2018 (Unit 1)
2. Dhananjay M. Dhamdhere, “Operating Systems: A Concept-Based Approach”, 3rd Edition, McGraw- Hill, 2015 (Unit 2, 3)
3. Jordan Krause, “Windows Server 2016 Security, Certificates, and Remote Access Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016”, Pckt Publishing, 2018.
4. Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,“Linux Administration Handbook”, Fifth Edition, Addison-Wesley, 2017 (Unit 5)
5. Promod Chandra P Bhat,, “An Introduction to Operating Systems: Concepts and practice”, 5th Edition, Prentice Hall of India, 2019.
6. William Stalling, “Operating System: Internals and Design Principles”, 9th Edition, Pearson, 2017.
7. Tom Adelstein and Bill Lubanovic, “Linux System Administration”, 1st Edition, Shroff., 2012.